FB pixel

Biometric-bound credentials take stage at EAB talk from Trust Stamp’s CSO

Secrets abound in breakdown of key-based biometric cryptosystems
Categories Biometric R&D  |  Biometrics News
Biometric-bound credentials take stage at EAB talk from Trust Stamp’s CSO
 

The latest EAB Member Lunch Talk from the European Association for Biometrics features Dr. Norman Poh, chief science for Trust Stamp, who speaks on the topic of biometric-bound credentials and how they enable zero knowledge proof (ZKP) applications.

Poh defines binding as the process of capturing a biometric sample, “generating an internal secret and using that secret to encrypt an external secret.” Likewise, unbinding is when the secret is decrypted as part of the verification flow. The goal, he says, is to “bind your face to an external secret” – or private key – so that biometric data is linked directly to cryptographic credentials.

“Effectively,” he says, “you are your authenticator.”

Pho says the process also generates a data package called a sketch, which is needed to later reconstruct the internal secret once the algorithm receives another biometric capture of the same individual. This packet of “helper data” is stored with the encrypted key in what Poh calls a “registration artefact.”

The algorithms Poh refers to as the key-generating biometric cryptosystem (or “fuzzy extractor”) for encoding and key binding biometric cryptosystem (or “fuzzy vault scheme”) for decoding are governed by ISO/IEC 24745:2022 – Biometric information protection. The internet secret “does not correlate with biometrics” but, during the encoding process, is mixed with data from a biometric stable signal to create the Sketch – from which neither original piece of data can be derived.

When an additional biometric scan is mixed with the stable signal and the sketch, the internal secret can be decoded. Secure implementation requires liveness detection, post-quantum ready cryptography and cryptographic sharding of the sketch between a client and server, or what Poh calls a “split trust model.” Once the server shard is downloaded onto a device, it can be used offline – which, says Poh, can be especially useful for digital travel credentials.

In describing workflows for provisioning a second device and account recovery, Poh positions biometric-bound credentials as the next step in the evolution of secure, passwordless biometric authentication.

While FIDO2 passkeys are “very much device-specific,” making them vulnerable to “friendly fraud” by individuals who have access to a device, biometric bound credentials and the biometric cryptosystem model of Trust Stamp’s stable IT2 implementation offers privacy by design, enable sharable passkeys and ensure “genuine presence” – which Poh compares to World’s clumsily named “proof of human” model – using a secure ZKP protocol.

In summary, says Poh, the system “addresses account recovery, can perform offline authentication, enables ZKP of human presence and is device agnostic.”

More on the EAB Member Lunch Talk series can be found here.

Related Posts

Article Topics

 |   |   |   |   |   |   |   |   | 

Latest Biometrics News

 

Certainty vs flexibility – does the UK need a Biometric Surveillance Act?

By Professor Fraser Sampson, former UK Biometrics & Surveillance Camera Commissioner Last week London became a city of two tales. Two…

 

TestMu AI releases testing tool for agent-produced code

TestMu AI (formerly LambdaTest) has launched Kane CLI, “a new browser automation tool that runs directly from the terminal,” and…

 

Travel biometrics making new connections

Airport biometrics projects and companies are breaking new ground and intersecting with other industry trends, from digital wallets to biometric…

 

Biometric Update Podcast: Teresa Wu on SIA’s Corporate Credential Design Guide

The Security Industry Association (SIA) has published its Corporate Credential Design Guide, and Idema Public Security’s Teresa Wu, who has…

 

AI agents operating continuously at machine speed are breaking human-centric IAM

New research commissioned by Ping Identity and compiled by KuppingerCole Analysts shows that “agents are being deployed into production faster…

 

Criticism follows inclusion of Madras Security Printers in Sri Lanka digital ID bids

Civil society group the People’s Struggle Alliance (PSA) has raised concerns regarding the inclusion of Madras Security Printers (MSP) in…

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Biometric Market Analysis and Buyer's Guides

Most Viewed This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events